Investigating Fake News With Google, YouTube & Facebook

Tech bosses Mark Zuckerberg, Sundar Pichai and Jack Dorsey were being questioned last week by politicians in the US Congress over the proliferation of disinformation on YouTube, Twitter and Facebook in the first such since the storming of the Washington Capitol building, which many believe will prove a tipping point for greater regulation of Social Media..

Specifically, the hearings are related to the Congress'  consideration of scrapping Section 230, the legislation that was crafted in the early days of the internet so that website owners could moderate sites without worrying about legal liability, by effectively saying that they are not publishers.

Because social media is a public platform, anyone, including news outlets, can post anything without being accountable for fact-checking and it left to users to distinguish misinformation from disinformation and plain lies in their feeds.  Academics and practitioners alike have asked why people share such misinformation, and sought solutions to reduce the sharing of misinformation

The sharing of misinformation on social media, including, but not limited to, blatantly false political ‘fake news’ and misleading and partisan content, has become a major topical focus of public debate and academic study.

Although misinformation is nothing new, the topic gained prominence in 2016 after the US Presidential Election and the UK’s Brexit referendum, during which entirely fabricated stories, which were presented as legitimate news, received wide distribution via social media. 

This is a problem that has gained even more attention during the COVID-19 pandemic. and the Capitol Hill riot following the 2020 US Presidential Election.  

  • First in the line of fire was Facebook boss, Mark Zuckerberg who favours limited reforms, going further than his two peers. "We believe Congress should consider making platforms' intermediary liability protection for certain types of unlawful content conditional on companies' ability to meet best practice to combat the spread of this content," he wrote. 
  • Twitter's Mr Dorsey said efforts to combat misinformation must be linked to "earning trust" from users by focusing on "enhancing transparency, ensuring procedural fairness, enabling algorithmic choice, and strengthening privacy".
  • Mr Pichai  referred to Section 230, saying repealing it "would have unintended consequences - harming both free expression and the ability of platforms to take responsible action to protect users in the face of constantly evolving challenges".

The truth and accuracy of news headlines has little effect on social media users' sharing intentions and sharing itself does not necessarily indicate belief. Most participants say it is important to share only accurate news, however to investigate this apparent contradiction, various surveys have been done and a field experiment carried out on Twitter. The results show that subtly shifting attention to accuracy increases the quality of news that people subsequently share.

Together with additional computational analyses, these findings indicate that people often share misinformation because their attention is focused on factors other than accuracy, and therefore they fail to implement a strongly held preference for accurate sharing.

Misinformation is problematic because it leads to inaccurate beliefs and can exacerbate partisan disagreement over even basic facts. Merely reading false news posts, including political posts that are extremely implausible and inconsistent with one’s political ideology, makes them subsequently seem more true

In addition to being concerning, the widespread sharing of misinformation on social media is surprising, given the outlandishness of much of this content.

What differentiates misinformation from disinformation is the intent of the person or outlet sharing it. In a study by researchers for from Indiana University, misinformation is classified as “false or misleading content including hoaxes, conspiracy theories, fabricated reports, click-bait headlines, and even satire.” Misinformation is not deliberately intended to deceive. Instead, it aims to shape or change public opinion on a given topic.

Indiana University:     Nature:      BBC:       NiemanLab:      MailChimp:      Image: Unsplash

You Might Also Read: 

Social Media Has Gone Global:

Easy Cyber Knowledge Chapter 3  - Social Media & Social Change (£) :

 

« Facebook's Internal Content Rules Revealed
CISA, NSA And The Dual Hat »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Advanced Resource Managers (ARM)

Advanced Resource Managers (ARM)

ARM provide specialist recruitment services for technology and engineering including cyber security.

Viscount Systems

Viscount Systems

Viscount Systems is a global security software solutions company that is changing the way access control is deployed and managed in the enterprise.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

VIBE Cybersecurity International

VIBE Cybersecurity International

VIBE’s certificate-less authenticated encryption enables scalable, flexible key exchange, and other advanced cryptographic functions using identity-based elliptic curve cryptosystems (ECC).

Duality Technologies

Duality Technologies

Duality Technologies combine Advanced Cryptography with Data Science to deliver High-Performance Privacy-Protecting Computing to Regulated Industries.

Information & Communications Technology Association of Jordan (int@j)

Information & Communications Technology Association of Jordan (int@j)

The Information & Communications Technology Association of Jordan is a membership based ICT and IT Enabled Services (ITES) industry advocacy, support and networking association.

KryptoKloud

KryptoKloud

KryptoKloud offer a suite of Managed Services including Security Monitoring and Incident Response as well as a full portfolio of Compliance, Governance and Audit solutions.

Qrypt

Qrypt

Qrypt has developed the only cryptographic solution capable of securing information indefinitely with mathematical proof as evidence.

Acumera

Acumera

Acumera is a leader in managed network security, visibility and automation services.

Zitec

Zitec

One of Europe's largest and most prominent full-cycle software development services companies, Zitec is the digital transformation partner to companies in the EU, UK, USA, Canada and ME.

DigitalPlatforms

DigitalPlatforms

DigitalPlatforms SpA is an Italian group with the mission of providing end-to-end solutions and Internet of Things and Cyber technologies to companies that manage critical infrastructures.

Rampart AI

Rampart AI

Tackling DevSecOps Issues In Application Security. Rampart has revolutionized the shift left security approach, applying zero-trust to application development.

View

View

View is the leader in smart building technologies including OT cybersecurity to securely connect buildings to the cloud and manage building networks and OT devices.

Offenso Hackers Academy

Offenso Hackers Academy

At Offenso we focus on cyber security training focused on producing cyber security professionals with a wide range of abilities to counter threats from the internet and cloud to a business.

Mother Technologies

Mother Technologies

From Datacentre to Desktop, Mother Technologies has been delivering IT Support, Telecoms, Cybersecurity and Connectivity services to businesses across Scotland and beyond since 2002.

SoteriaSec

SoteriaSec

SoteriaSec is a premier cybersecurity firm providing comprehensive digital forensics and incident response services.